Cache-Collision Timing Attacks Against AES
暂无分享,去创建一个
[1] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[2] Vincent Rijmen,et al. The Design of Rijndael , 2002, Information Security and Cryptography.
[3] Dan Page,et al. Defending against cache-based side-channel attacks , 2003, Inf. Secur. Tech. Rep..
[4] Frédéric Valette,et al. Enhancing Collision Attacks , 2004, CHES.
[5] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES (Short Paper) , 2006, ICICS.
[6] Colin Percival. CACHE MISSING FOR FUN AND PROFIT , 2005 .
[7] Bruce Schneier,et al. Side channel cryptanalysis of product ciphers , 2000 .
[8] Onur Aciiçmez,et al. Improving Brumley and Boneh timing attack on unprotected SSL implementations , 2005, CCS '05.
[9] Jean-Pierre Seifert,et al. Software mitigations to hedge AES against cache-based software side channel vulnerabilities , 2006, IACR Cryptol. ePrint Arch..
[10] Vincent Rijmen,et al. The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .
[11] Hiroshi Miyauchi,et al. Cryptanalysis of DES Implemented on Computers with Cache , 2003, CHES.
[12] Mairéad O'Hanlon,et al. INVESTIGATION OF CACHE-TIMING ATTACKS ON AES , 2005 .
[13] Christof Paar,et al. A Collision-Attack on AES: Combining Side Channel- and Differential-Attack , 2004, CHES.
[14] Dan Page,et al. Theoretical Use of Cache Memory as a Cryptanalytic Side-Channel , 2002, IACR Cryptol. ePrint Arch..
[15] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[16] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[17] Christof Paar,et al. A New Class of Collision Attacks and Its Application to DES , 2003, FSE.
[18] Y. Tsunoo,et al. Cryptanalysis of Block Ciphers Implemented on Computers with Cache , 2002 .
[19] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[20] Vittorio Zaccaria,et al. AES power attack based on induced cache miss and countermeasure , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[21] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[22] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[23] Jean-Pierre Seifert,et al. A refined look at Bernstein's AES side-channel analysis , 2006, ASIACCS '06.
[24] Onur Aciiçmez,et al. Trace-Driven Cache Attacks on AES , 2006, IACR Cryptol. ePrint Arch..
[25] Cédric Lauradoux,et al. Collision attacks on processors with cache and countermeasures , 2005, WEWoRC.
[26] Dan Page,et al. Partitioned Cache Architecture as a Side-Channel Defence Mechanism , 2005, IACR Cryptology ePrint Archive.
[27] Paul Dischamp,et al. Power Analysis, What Is Now Possible , 2000, ASIACRYPT.
[28] Jean-Pierre Seifert,et al. Advances on Access-Driven Cache Attacks on AES , 2006, Selected Areas in Cryptography.
[29] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[30] Kazuhiko Minematsu,et al. Improving cache attacks by considering cipher structure , 2005, International Journal of Information Security.
[31] Anne Canteaut,et al. Understanding cache attacks , 2006 .